From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Normalizing Security Events with a Hierarchical Knowledge Base., , , и . WISTP, том 9311 из Lecture Notes in Computer Science, стр. 237-248. Springer, (2015)The (Persistent) Threat of Weak Passwords: Implementation of a Semi-automatic Password-Cracking Algorithm., , , и . ISPEC, том 11879 из Lecture Notes in Computer Science, стр. 464-475. Springer, (2019)How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect., , , и . PDH, стр. 55-62. ACM, (2019)Improving access to online lecture videos., , и . EDUCON, стр. 1161-1168. IEEE, (2018)Enhance learning in a video lecture archive with annotations., , и . EDUCON, стр. 849-856. IEEE, (2018)Using quantified trust levels to describe authentication requirements in federated identity management., , и . SWS, стр. 71-80. ACM, (2008)Automatic Vulnerability Classification Using Machine Learning., , и . CRiSIS, том 10694 из Lecture Notes in Computer Science, стр. 3-17. Springer, (2017)Sample Method for Minimization of OBDDs., и . SOFSEM, том 1521 из Lecture Notes in Computer Science, стр. 419-428. Springer, (1998)Live Migration Timing Optimization for VMware Environments using Machine Learning Techniques., , и . CLOSER, стр. 91-102. SCITEPRESS, (2020)BMXNet 2: An Open Source Framework for Low-bit Networks - Reproducing, Understanding, Designing and Showcasing., , , и . ACM Multimedia, стр. 4469-4472. ACM, (2020)